5 Steps to Stop the Latest OpenSSL Vulnerabilities: CVE-2022-3602, CVE-2022-3786
Blog post from Sysdig
On November 1, 2022, two high-severity vulnerabilities in OpenSSL v3, identified as CVE-2022-3602 and CVE-2022-3786, were disclosed, affecting all versions up to 3.0.6, with fixes included in version 3.0.7. While initially rated as critical, the severity of CVE-2022-3602 was downgraded to high after testing revealed it was not easily exploitable on common platforms. These vulnerabilities involve stack-based buffer overflows in X.509 certificate verification and can potentially lead to denial of service, although remote code execution is unlikely. Organizations are advised to identify and prioritize vulnerable workloads, remediate threats by updating OpenSSL, and utilize tools like Sysdig Secure for continuous monitoring and threat detection. Despite the vulnerabilities not being as severe as Heartbleed, proactive patching and vulnerability management remain crucial to prevent exploitation, with Sysdig offering enhanced capabilities through its Falco-based threat detection and response tools.